Enhancing Security of Intermediate Devices in the Connection Between IoT Devices and Cloud Service
Error Pattern Discovery in Spellchecking Using Multi-Class Confusion Matrix Analysis for the Croatian Language
10 GBPS flow aggregation using commodity hardware
10 GBPS flow aggregation using commodity hardware
Study of Data Transfer Nodes Infrastructure in Enabling Big Data Movement between Research and Cloud Storage Networks
A Comprehensive Dataset of Spelling Errors and Users’ Corrections in Croatian Language
Evaluation of Inter-Dataset Generalisability of Autoencoders for Network Intrusion Detection
Evaluation of Inter-Dataset Generalisability of Autoencoders for Network Intrusion Detection
Supervisory Control and Data Acquisition (SCADA) Systems in Continuous Manufacturing Process Control
SCADA Systems With Focus on Continuous Manufacturing and Steel Industry: A Survey on Architectures, Standards, Challenges and Industry 5.0
Securing IoT Services Based on Security Requirement Categories
Surgical DDoS Filtering With Fast LPM
Hybrid hardware/software datapath for near real- time reconfigurable high-speed packet filtering
Ranking Network Devices for Alarm Prioritisation: Intrusion Detection Case Study
Anomaly Correction in Time Series Data for Improved Forecasting
Comparison of Cuckoo Hash Table and Bloom Filter for Fast Packet Filtering Using Data Plane Development Kit
Comparison of Cuckoo Hash Table and Bloom Filter for Fast Packet Filtering Using Data Plane Development Kit
Comparison of Cuckoo Hash Table and Bloom Filter for Fast Packet Filtering Using Data Plane Development Kit
Adaptable secure communication for the Cloud of Things
Security research and learning environment based on scalable network emulation
Pushing the envelope: Beyond two billion IP routing lookups per second on commodity CPUs
Lightweight and adaptable solution for security agility
Smart Detection and Classification of Application-Layer Intrusions in Web Directories
A network testbed for commercial telecommunications product testing
Modular software platform for network traffic processing in the core operating system
DXR : towards a billion routing lookups per second in software
Implementation of the transport layer independent parameters negotiation protocol
Forensic analysis of the Mac OS X keychain
IMUNES control interface for "Linux Containers"
NgP - Protokol za dogovor parametara
Implementing Certificate-based Authentication Protocol on Smart Cards
Quality of service mechanisms and priority management in HSPA system
Security Agility Solution Independent of the Underlaying Protocol Architecture
Improving distributed traffic generation performance by using IMUNES network emulator
Scalable software architecture for distributed MMORPG traffic generation based on integration of UrBBaN-Gen and IMUNES
Measurement and Analysis of Network Emulation Systems Performance
Model of SMS traffic regulation in signaling transfer point for improved security of mobile network
Deploying New Hash Algorithms in Secure Neighbor Discovery
Quality of service mechanisms and priority management in UMTS and HSPA system
Security Measures For the Protection of DNS/EMU Node in the IP Multimedia Subsystem
60th anniversary of the Department of telecommunications
Opportunistic Authentication Methods In New Generation Networks
SIP media communication establishment in IPv6/IPv4 networks without quality of service degradation
Evaluation of Standard Based Solutions Enabling Voice and SMS Services During Transition Period Towards LTE Networks
Modular control of virtual node parameters in the IMUNES system
P2P SUPPORT FOR DISTRIBUTED SIMULATION/EMULATION OF HIGH SPEED IP NETWORKS
Design of the IPv4 Routing System Based On Field-Programmable Gate Arrays
Implementation of Communication Functions Using Field- Programmable Gate Arrays
Synthetic IP / Ethernet Traffic Transmission System Based On Field- Programmable Gate Arrays
A Method For Evaluation Of IP Multimedia Subsystem Resistance To Distributed Denial Of Service Attacks
Implementation of mechanisms for controlling virtual nodes in IMUNES system through remote procedure calls
Extending Internal Program Interfaces of Management Layer in IMUNES
Implementation of multicast forwarding management support using passive IGMP snooping in software Ethernet switch
SEND-based Source Address Validation for IPv6
Diagnosis and solving IP based audio signal transmission problems
Confidential User Data Exchange Among Digital Identity Management Systems
Security in Private Communication Networks
Risk Management In Information Resources Security Management System
DISTRIBUTED REAL-TIME SIMULATION OF HIGH SPEED IP NETWORKS
PERFORMANCE EVALUATION OF INTERNET PROXY SYSTEMS
Clustering Network Simulation: Graph Partitioning Approach
Operating System Support for Integrated Network Emulation in IMUNES
Proceedings of the 7th International Conference on Telecommunications - ConTEL2003 Volume 2 of 2
Proceedings of the 7th International Conference on Telecommunications - ConTEL2003 Volume 1 of 2
Proceedings of the 7th International Conference on Telecommunications - ConTEL2003
Real-Time IP Network Simulation at Gigabit Data Rates
Clonable network stack - concepts and potential applications
An approach to education oriented TCP simulation
Estimating the Impact of Interrupt Coalescing Delays on Steady State TCP Throughput
Automatic Translation From SDL Specification To Distributed Erlang Implementation
Telephone Traffic Routing Simulation Using Learning Automata
WWW.HR - Experiences with Web-server development and maintenance
Automatic Erlang Code Generation from SDL Specification
From the SDL Specification Toward the Erlang Implementation
Object Orientation in SDL
Laboratory for Telecommunications Software Technologies at the Faculty of Electrical Engineering and Computing at Zagreb
Specification of Erlang Applications
Methods for checking specification correctness of telecommunication processes
SDL graphical editor
Implementation of a distributed hypermedia information system based on the WWW concept
Programming Languages - models, techniques and applications
Model of a Workstation for application of learning automata into object oriented simulation of adaptive routing methods
First experiences with the World-Wide Web in Croatia
Experimental Model of Operation and Maintenance Workstation: Expert System Module for Alarm Analysis
PBX-LAN Based Local Communication System
Experimental Expert Tools for Diagnostic in Telecommunication System and Network Management
A Functional Model of Call/Service Handling Algorithms
Teaching
University undergraduate
- Computer Security (Lecturer in charge)
- Computer Security (Lecturer in charge)
- Digital Logic (Lecturer in charge)
- Digital Logic (Lecturer in charge)
- Network Programming (Lecturer in charge)
- Network Programming (Lecturer in charge)
- BSc Thesis (Lecturers)
- BSc Thesis (Lecturers)
- BSc Thesis (Lecturers)
- Final BSc Thesis (Lecturers)
- Final BSc Thesis (Lecturers)
- Project C (Lecturers)
- Project C (Lecturers)
- Software Design Project (Lecturers)
- Software Design Project (Lecturers)
- Software Design Project (Lecturers)
University graduate
- Communication Security (Lecturer in charge)
- Network and Service Management (Lecturer in charge)
- SCADA Systems (Lecturer in charge)
- Security Threats on the Internet (Lecturer in charge)
- Graduation Thesis (Lecturers)
- Graduation Thesis (Lecturers)
- Graduation Thesis (Lecturers)
- Project (Lecturers)
- Project (Lecturers)
- Project (Lecturers)
- Project (Lecturers)
- Project (Lecturers)
- Seminar 1 (Lecturers)
- Seminar 2 (Lecturers)
Postgraduate doctoral study programme
- Communication Protocols-Selected Topics (Lecturer in charge)
- Formalisms in Telecommunications (Lecturer in charge)
Postgraduate spec. study
- Security of computer networks (Lecturer in charge)
Competences
-
Circuits and systems
Logic circuits Programmable circuits Logic devices -
Computers and information processing
Computer networks Internet security IP networks Network security Computer security Denial-of-service attack Firewalls (computing) Honey pot (computing) Internet security Mobile security Penetration testing Software engineering Formal verification -
Communications technology
Communication networks Communication system security Computer networks Network security Internet security IP networks Mobile security Protocols Telecommunications